This post is by a banned member (IvanBMWorld) - Unhide
28 September, 2020 - 12:28 PM
Reply
(07 September, 2020 - 04:09 PM)Uninterupted Wrote: Show More Today I am releasing one of my main botnets for the reaking of havoc on the planet.
The features are:
bot nickname format: priviledge[WINVERSION|x86/x64|cpucores]BOTID
Commands:
Code:
!* syn ip port time - SYN connect flood
!* condis ip port time - Rapid connect/disconnect flood
!* tcp ip port time - TCP flood
!* http ip port path time - HTTP flood
!* arme ip port path time - Apache remote memory exhaustion flood
!* rdp - rdp data stealer
!* noip - noip stealer
!* filezilla - filezilla stealer
!* silentinstall msiurl - Silent MSI installer
!* dlexe exeurl - Download and execute
!* usb - USB .lnk infecter
!* sendmail - Outlook massmailer
You can also call a portion of you net with !a* [command] or !*x [command]
This botnet also include selfrep through SMB, VNC, and MSSQL. Simply change the $dlexe to your hex encoded download and execute command.
DL:
I like ur content bebesita
This post is by a banned member (NarcissisticPenguin_) - Unhide
28 October, 2020 - 11:33 PM
Reply
This post is by a banned member (TheoryMods) - Unhide
31 October, 2020 - 12:05 PM
Reply
(07 September, 2020 - 04:09 PM)Uninterupted Wrote: Show More Today I am releasing one of my main botnets for the reaking of havoc on the planet.
The features are:
bot nickname format: priviledge[WINVERSION|x86/x64|cpucores]BOTID
Commands:
Code:
!* syn ip port time - SYN connect flood
!* condis ip port time - Rapid connect/disconnect flood
!* tcp ip port time - TCP flood
!* http ip port path time - HTTP flood
!* arme ip port path time - Apache remote memory exhaustion flood
!* rdp - rdp data stealer
!* noip - noip stealer
!* filezilla - filezilla stealer
!* silentinstall msiurl - Silent MSI installer
!* dlexe exeurl - Download and execute
!* usb - USB .lnk infecter
!* sendmail - Outlook massmailer
You can also call a portion of you net with !a* [command] or !*x [command]
This botnet also include selfrep through SMB, VNC, and MSSQL. Simply change the $dlexe to your hex encoded download and execute command.
DL:
yessuh
This post is by a banned member (justinho) - Unhide
06 December, 2020 - 12:46 PM
Reply
thanks man...it is the same darkirc that made it to the news? attacking weblogic?
This post is by a banned member (N3cros1s) - Unhide
06 December, 2020 - 01:59 PM
Reply
good job man,thanks for sharing.
This post is by a banned member (bobbengal) - Unhide
22 March, 2021 - 11:27 AM
Reply
i have never used a botnet before so this is my first time
This post is by a banned member (new_folder_shortcut) - Unhide
17 April, 2021 - 08:35 AM
Reply
This post is by a banned member (barkata0x) - Unhide
20 April, 2021 - 07:56 PM
Reply